Athicc: an Anonymous, Asynchronous, Serverless Instant Messaging Protocol

Total Page:16

File Type:pdf, Size:1020Kb

Athicc: an Anonymous, Asynchronous, Serverless Instant Messaging Protocol Proceedings of the 52nd Hawaii International Conference on System Sciences | 2019 ATHiCC: An Anonymous, Asynchronous, Serverless Instant Messaging Protocol Daniel F. Balchasan Michal Ozaniak Yoav Schwartz Nicolai S. Steffensen Aalborg University Aalborg University Aalborg University Aalborg University [email protected] [email protected] [email protected] [email protected] Samant Khajuria Lene T. Sørensen Aalborg University Aalborg University [email protected] [email protected] Abstract encryption by default can, and do, collect ‘metadata’. This metadata includes, but is not limited to, the Instant messaging has become a main form of sender, receiver, and location of the message. communication between people. The ability to Therefore, even though the content of the message is instantly send messages to each other, even when the secure, enough information can be deduced with the recipient is offline, has become second nature and is metadata to undermine the user’s privacy. taken for granted in modern society. However, this is Chat software that do put encryption and privacy not without a cost. In the case of instant messaging, at the top of their priority, like Telegram, get attacked that cost is privacy. Service providers use centralized by governments [7], and users are getting blocked servers to store these messages and can collect from the service. This is relatively easy to achieve information using the messages ‘Metadata’ or even through the ISPs [8], since they can be forced to block read the contents of messages. This paper presents a access to the servers that host the chat service. novel protocol, ATHiCC (Asynchronous Tor Hidden These points have led the authors to conclude that Chat Communication) [1] that allows private and there is a need for a fully distributed, autonomous anonymous communication that doesn't require a instant messaging software that would be secure, server, and yet is still able to support asynchronous private and anonymous, so that no user data can be communication. A simulator was implemented to test collected. the protocol and performance under various network There are applications [9][10] that do provide these conditions and topologies. The results of the requirements, however they are not widely used as simulation predict high delivery rates and low delays they are less usable than their popular counterparts and in message delivery under most conditions, even in users often choose what they deem is secure enough small network topologies. over a more secure option that is less usable [11]. One of the main features missing from these programs, is one we take for granted in modern 1. Introduction communication systems, namely, the ability to send messages in an asynchronous manner when the Privacy is a fundamental human right, as recipient is offline. This is because they rely on Peer- recognized by the UN Declaration of Human Rights to-Peer communication between clients which makes [2] and yet, recent events make it clear that internet it challenging to support asynchronous features. users right to privacy is being violated. Governments The goal of this paper is to suggest a protocol that are collecting more information than ever [3] and supports asynchronous messaging while being private, some of the biggest companies in the world use users’ secure and fully distributed. This work is done by personal data as a financial model e.g. Facebook and designing a protocol that uses other users in the Google. network, in a unique fashion, while relying on the Facebook, the biggest social network in the world, characteristics of Tor onion services to deliver which was involved in a scandal leaking millions of asynchronous messages. The protocol is then tested users’ details [4], has one the most popular instant using a simulation software developed to test the messaging applications on the market [5]. In protocol’s performance under varying conditions. “Messenger”, Facebook’s instant messaging The outline of this paper is as follows; in Section application [6], conversations are not end-to-end 2, an overview of related work is presented. In Section encrypted by default, meaning Facebook can read the 3 the conceptual framework around the protocol is laid majority of messages sent. out. Section 4 and Section 5 give the background and Even chat services that do implement end-to-end URI: https://hdl.handle.net/10125/59942 ISBN: 978-0-9981331-2-6 Page 5049 (CC BY-NC-ND 4.0) details of the protocol. Section 6. contains the 2.3. Tox methodology for the simulation, and in Section 7 the results of the simulation are presented. Finally, Section Tox [9] is an encrypted instant messaging protocol, 8 and Section 9 discuss the considerations made in the which provides peer-to-peer communication. It works design process and possible future work. by creating a network of users, who via an anonymous identifier connect and send messages to each other. 2. Related Work The protocol employs perfect forward secrecy, just like Signal does. Much work has been put into developing solutions Tox doesn’t natively support asynchronous for secure and private end-to-end encrypted messages, it only implements a ‘pseudo-offline’ communication. Many of these approaches either offer message [19], where a message is stored locally at the high levels of security and anonymity, but with a low user, until both are online. Third-party developers number of features with respect to messaging. Others have tried to solve this issue of Asynchronous offer many features, but lower levels of security and messaging in two different ways: Relay through anonymity. another user and relay through a decentralized server, called ‘supernodes’. None of the presented solutions combine both high 2.1. Ricochet levels of security and the possibility to send asynchronous messages and to the best of the authors Ricochet [10] is an example of a chat application knowledge, no other current solution on the market which offers high-level security and anonymity by offer this. In this paper, such a solution will be utilizing Tor [12] and Tor Onion Services [13]. It presented. utilizes end-to-end encryption and guarantees that only the sender and receiver can read the content. 3. Conceptual Framework By utilizing Tor Onion Services, it also eliminates any possibility that an entity can gather metadata or track who send which message. Furthermore, the In this section we will present some of the concepts application works autonomously without the need of and terms needed in order to understand the design and any kind of servers for routing or connecting peers, functionality of the solution presented in this paper. since this is done by the Tor network. This means no one can track who is using the application, as all Tor 3.1. Tor traffic is indistinguishable [14]. This level of security and anonymity does come with a downside as One of the main requirements set for the protocol Ricochet only works when both parties are online at is anonymity. In the context of this paper, maintaining the same time. anonymity means not disclosing any information which may indicate the identity of the user or their 2.2. Signal location, namely the IP address of the device. It was decided that the IP address would be kept private by designing the protocol over an Onion Signal is a chat protocol, developed by Open Routing network [18]. Whispers Systems in 2013 [15] and implemented into Onion Routing [20] provides anonymous routing a number of different chat applications like, Signal of data over the internet, by encapsulating data packets [16], WhatsApp [17], secret conversations in (including the IP layer headers) in encryption layers Facebook Messenger and Google Allo in incognito like an onion (hence the name). These packets are then mode [18]. It offers a high level of security by enabling sent through multiple proxies (Onion Routers), each end-to-end encryption, with a different key for each removing a layer of encryption until the clear-text message. Providing perfect forward secrecy, so that if packet is sent by the last proxy to the destination. one key is lost, no other messages can be decrypted. The Onion Routing network selected for the In Signal all messages are sent to a server, making protocol is Tor [12], due to the scale and performance. it possible to send messages to users who are offline. In order to open secure connections over the Tor This doesn’t allow the server to see the content of the network, first a list of onion routers must be retrieved messages, but all metadata can be collected. Signal is from a distributed hash table. Using this list, three therefore considered as a secure, but not a private chat random onion routers are picked which will function protocol. as proxies. Shared keys are then negotiated via TLS/SSLv3 with each of the onion routers and a path (tunnel) in the network is created. Page 5050 When using Tor onion routing, even though the 3.3. Centralized/decentralized/distributed base packets are sent over TCP/IP, they cannot be traced back to their source, even by the receiver of the Centralized Systems are systems which rely on a packet. However, as the packets leave the last leg of single entity for decision making, such as a server. the path unencrypted, the payloads of said packets are This means that one entity (or a group of entities acting not kept secure. as one) provides a critical service for the function of the system. 3.2. Tor Onion Services Onion services [13] is a feature of the Tor network. Previously known as ‘Hidden Service’, Onion Services allow devices to provide services over the Tor network, without revealing their IP addresses, and thus their location.
Recommended publications
  • MASTERCLASS GNUPG MASTERCLASS You Wouldn’T Want Other People Opening Your Letters and BEN EVERARD Your Data Is No Different
    MASTERCLASS GNUPG MASTERCLASS You wouldn’t want other people opening your letters and BEN EVERARD your data is no different. Encrypt it today! SECURE EMAIL WITH GNUPG AND ENIGMAIL Send encrypted emails from your favourite email client. our typical email is about as secure as a The first thing that you need to do is create a key to JOHN LANE postcard, which is good news if you’re a represent your identity in the OpenPGP world. You’d Ygovernment agency. But you wouldn’t use a typically create one key per identity that you have. postcard for most things sent in the post; you’d use a Most people would have one identity, being sealed envelope. Email is no different; you just need themselves as a person. However, some may find an envelope – and it’s called “Encryption”. having separate personal and professional identities Since the early 1990s, the main way to encrypt useful. It’s a personal choice, but starting with a single email has been PGP, which stands for “Pretty Good key will help while you’re learning. Privacy”. It’s a protocol for the secure encryption of Launch Seahorse and click on the large plus-sign email that has since evolved into an open standard icon that’s just below the menu. Select ‘PGP Key’ and called OpenPGP. work your way through the screens that follow to supply your name and email address and then My lovely horse generate the key. The GNU Privacy Guard (GnuPG), is a free, GPL-licensed You can, optionally, use the Advanced Key Options implementation of the OpenPGP standard (there are to add a comment that can help others identify your other implementations, both free and commercial – key and to select the cipher, its strength and set when the PGP name now refers to a commercial product the key should expire.
    [Show full text]
  • Secure Messaging1
    SoK: Secure Messaging1 Nik Unger∗, Sergej Dechandy Joseph Bonneauzx, Sascha Fahl{, Henning Perl{ Ian Goldberg∗, Matthew Smithy ∗ University of Waterloo, y University of Bonn, z Stanford University, x Electronic Frontier Foundation, { Fraunhofer FKIE Abstract—Motivated by recent revelations of widespread state insecure ways. However, as will become clear over the course surveillance of personal communication, many products now of this paper, the academic research community is also failing claim to offer secure and private messaging. This includes both a to learn some lessons from tools in the wild. large number of new projects and many widely adopted tools that have added security features. The intense pressure in the past two Furthermore, there is a lack of coherent vision for the future years to deliver solutions quickly has resulted in varying threat of secure messaging. Most solutions focus on specific issues models, incomplete objectives, dubious security claims, and a lack and have different goals and threat models. This is com- of broad perspective on the existing cryptographic literature on pounded by differing security vocabularies and the absence of secure communication. a unified evaluation of prior work. Outside of academia, many In this paper, we evaluate and systematize current secure messaging solutions and propose an evaluation framework for products mislead users by advertising with grandiose claims their security, usability, and ease-of-adoption properties. We con- of “military grade encryption” or by promising impossible sider solutions from academia, but also identify innovative and features such as self-destructing messages [7]–[10]. The recent promising approaches used “in the wild” that are not considered EFF Secure Messaging Scorecard evaluated tools for basic by the academic literature.
    [Show full text]
  • Deleted Message Request Facebook
    Deleted Message Request Facebook proscriptivelyIago remains born-againwhile rubblier after Patrice Joachim jostles canoed brashly doggishly or disapproved or levigated sudden. any exemplum.Wally surpass Bogart springily? harkens But the deleted conversation I want to recover just wont show. Open the Facebook messenger on the mobile. That is the three lines at the top right. Use the Facebook option for archiving data to reduce the chances of facing a problem with lost chats. Facebook has created a cedar to do back and view despite the activities on their account, will they still barely able to message me? FB deleting that message permanently? So for this one, and your messaging partners have total control from their end as well. Making hand written material compelling has your same effect. Open this browser installed on our software can only one will find various devices through favebook message that facebook fans and is? The request session class for doing so its simplicity can no idea how do not show concurrency message requests using i currently a temporary facebook. Can create a request facebook users with one will facebook messages, web version requires only if this. Are out looking exterior a message on Facebook which seems to see gone? Another valve is adding Facebook buttons on your website. Messenger by allowing users can i strongly recommend him for. How are Send FB Messages From Your Smartphone With Installing Messenger App? Congress in secret Mark Zuckerberg was questioned about how ongoing data Facebook keeps on the public, library it their favorite holiday, do not delete the shared photos in the save from both sides.
    [Show full text]
  • 2017 the Human the JOURNAL of POETRY, Touch PROSE and VISUAL ART
    VOLUME 10 2017 The Human THE JOURNAL OF POETRY, Touch PROSE AND VISUAL ART UNIVERSITY OF COLORADO ANSCHUTZ MEDICAL CAMPUS THE HUMAN TOUCH Volume 10 2017 GRAPHIC DESIGN EDITORS IN CHIEF Scott Allison Laura Kahn [email protected] Michael Berger ScottAllison.org James Yarovoy PRINTING EDITORIAL BOARD Bill Daley Amanda Glickman Citizen Printing, Fort Collins Carolyn Ho 970.545.0699 Diana Ir [email protected] Meha Semwal Shayer Chowdhury Nicholas Arlas This journal and all of its contents with no exceptions are covered Anjali Durandhar under the Creative Commons Attribution-Noncommercial-No Nick Arlas Derivative Works 3.0 License. To view a summary of this license, please see SUPERVISING EDITORS http://creativecommons.org/licenses/by-nc-nd/3.0/us/. Therese Jones To review the license in full, please see http://creativecommons.org/licenses/by-nc-nd/3.0/us/legalcode. Fair use and other rights are not affected by this license. To learn more about this and other Creative Commons licenses, please see http://creativecommons.org/about/licenses/meet-the-licenses. To honor the creative expression of the journal’s contributors, the unique and deliberate formats of their work have been preserved. © All Authors/Artists Hold Their Own Copyright CONTENTS CONTENTS PREFACE Regarding Henry Tess Jones .......................................................10 Relative Inadequacy Bonnie Stanard .........................................................61 Lines in Elegy (For Henry Claman) Bruce Ducker ...........................................12
    [Show full text]
  • Somebody Told Me You Died
    University of Montana ScholarWorks at University of Montana Graduate Student Theses, Dissertations, & Professional Papers Graduate School 2020 Somebody Told Me You Died Barry E. Maxwell Follow this and additional works at: https://scholarworks.umt.edu/etd Part of the Nonfiction Commons Let us know how access to this document benefits ou.y Recommended Citation Maxwell, Barry E., "Somebody Told Me You Died" (2020). Graduate Student Theses, Dissertations, & Professional Papers. 11606. https://scholarworks.umt.edu/etd/11606 This Thesis is brought to you for free and open access by the Graduate School at ScholarWorks at University of Montana. It has been accepted for inclusion in Graduate Student Theses, Dissertations, & Professional Papers by an authorized administrator of ScholarWorks at University of Montana. For more information, please contact [email protected]. SOMEBODY TOLD ME YOU DIED By BARRY EUGENE MAXWELL Associate of Arts in Creative Writing, Austin Community College, Austin, TX, 2015 Bachelor of Arts with Honors, The University of Texas at Austin, Austin, TX, 2017 Thesis presented in partial fulfillment of the requirements for the degree of Master of Fine Arts in Nonfiction The University of Montana Missoula, MT May 2020 Approved by: Scott Whittenburg Dean of The Graduate School Judy Blunt Director, Creative Writing Department of English Kathleen Kane Department of English Mary-Ann Bowman Department of Social Work Maxwell, Barry, Master of Fine Arts, Spring 2020 Creative Writing, Nonfiction Somebody Told Me You Died Chairperson: Judy Blunt Somebody Told Me You Died is a sampling of works exploring the author’s transition from “normal” life to homelessness, his adaptations to that world and its ways, and his eventual efforts to return from it.
    [Show full text]
  • CCIA Comments in ITU CWG-Internet OTT Open Consultation.Pdf
    CCIA Response to the Open Consultation of the ITU Council Working Group on International Internet-related Public Policy Issues (CWG-Internet) on the “Public Policy considerations for OTTs” Summary. The Computer & Communications Industry Association welcomes this opportunity to present the views of the tech sector to the ITU’s Open Consultation of the CWG-Internet on the “Public Policy considerations for OTTs”.1 CCIA acknowledges the ITU’s expertise in the areas of international, technical standards development and spectrum coordination and its ambition to help improve access to ICTs to underserved communities worldwide. We remain supporters of the ITU’s important work within its current mandate and remit; however, we strongly oppose expanding the ITU’s work program to include Internet and content-related issues and Internet-enabled applications that are well beyond its mandate and core competencies. Furthermore, such an expansion would regrettably divert the ITU’s resources away from its globally-recognized core competencies. The Internet is an unparalleled engine of economic growth enabling commerce, social development and freedom of expression. Recent research notes the vast economic and societal benefits from Rich Interaction Applications (RIAs), a term that refers to applications that facilitate “rich interaction” such as photo/video sharing, money transferring, in-app gaming, location sharing, translation, and chat among individuals, groups and enterprises.2 Global GDP has increased US$5.6 trillion for every ten percent increase in the usage of RIAs across 164 countries over 16 years (2000 to 2015).3 However, these economic and societal benefits are at risk if RIAs are subjected to sweeping regulations.
    [Show full text]
  • Wiretapping End-To-End Encrypted Voip Calls Real-World Attacks on ZRTP
    Institute of Operating Systems and Computer Networks Wiretapping End-to-End Encrypted VoIP Calls Real-World Attacks on ZRTP Dominik Schürmann, Fabian Kabus, Gregor Hildermeier, Lars Wolf, 2017-07-18 wiretapping difficulty End-to-End Encryption SIP + DTLS-SRTP (SIP + Datagram Transport Layer Security-SRTP) End-to-End Encryption & Authentication SIP + SRTP + ZRTP Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time Transport Protocol) 2017-07-18 Dominik Schürmann Wiretapping End-to-End Encrypted VoIP Calls Page 2 of 13 wiretapping difficulty End-to-End Encryption & Authentication SIP + SRTP + ZRTP Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time Transport Protocol) End-to-End Encryption SIP + DTLS-SRTP (SIP + Datagram Transport Layer Security-SRTP) 2017-07-18 Dominik Schürmann Wiretapping End-to-End Encrypted VoIP Calls Page 2 of 13 wiretapping difficulty Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time
    [Show full text]
  • CS 255: Intro to Cryptography 1 Introduction 2 End-To-End
    Programming Assignment 2 Winter 2021 CS 255: Intro to Cryptography Prof. Dan Boneh Due Monday, March 1st, 11:59pm 1 Introduction In this assignment, you are tasked with implementing a secure and efficient end-to-end encrypted chat client using the Double Ratchet Algorithm, a popular session setup protocol that powers real- world chat systems such as Signal and WhatsApp. As an additional challenge, assume you live in a country with government surveillance. Thereby, all messages sent are required to include the session key encrypted with a fixed public key issued by the government. In your implementation, you will make use of various cryptographic primitives we have discussed in class—notably, key exchange, public key encryption, digital signatures, and authenticated encryption. Because it is ill-advised to implement your own primitives in cryptography, you should use an established library: in this case, the Stanford Javascript Crypto Library (SJCL). We will provide starter code that contains a basic template, which you will be able to fill in to satisfy the functionality and security properties described below. 2 End-to-end Encrypted Chat Client 2.1 Implementation Details Your chat client will use the Double Ratchet Algorithm to provide end-to-end encrypted commu- nications with other clients. To evaluate your messaging client, we will check that two or more instances of your implementation it can communicate with each other properly. We feel that it is best to understand the Double Ratchet Algorithm straight from the source, so we ask that you read Sections 1, 2, and 3 of Signal’s published specification here: https://signal.
    [Show full text]
  • Adv Forensic
    Oklahoma State University School of Forensic Sciences Non-Thesis Creative Component Spring 2019 FRNS 5980 12-Week Course I. Course Description: This course is a 3 unit graduate level course focusing on the Forensic Sciences in relation to Fire Investigation and Explosives/Explosion Investigation. Each student will submit a topic that will further their understanding of one of the above areas of study. This class builds off of the Ethical Writing and Research Course as you use the same topic from that course. Method of Teaching: This course will utilize a variety of instructional methods, including assigned readings. In addition to assigned reading, students will research topics in current literature and provide their opinion on the matter, supported by references. Course Goals and Objectives: The goal of this course is to further understand the particular discipline each student is responsible in their professional occupation. However, an additional goal of this graduate level course is to prepare you for forensic investigations where you may be confronted by an original problem and be tasked with developing a solution. Therefore, your submitted assignments will be based on researching topics in current literature and applying your discoveries. Competencies: Students are required to demonstrate an appropriate level of accomplishment to include: Critical Thinking: The ability to analyze and support information. Writing: The ability to organize and communicate ideas efficiently and effectively through writing skills. Information Literacy: Demonstrate the ability to search, locate, access, and assess appropriate research materials/sources pertinent to course requirements. Students need to be able to use the best and most current information in writing their research papers for this course.
    [Show full text]
  • FALL 2020 E-NEWSLETTER at Digital Mountain We Assist Our Clients with Their Computer Forensics, E-Discovery, Cybersecurity and Data Analytics Needs
    FALL 2020 E-NEWSLETTER At Digital Mountain we assist our clients with their computer forensics, e-discovery, cybersecurity and data analytics needs. For this E-Newsletter, we focus on ephemeral communications and the affect of disappearing messages on discovery cases. Ephemeral Applications: Digital Trick or Treat The trick in trick or treating is one that has evolved from the neighbor who dons a monster mask when opening the door to the disappearance of peanut butter cups when Dad does the safety check of the night’s candy haul. Our digital communications have gone through an analogous transformation as we first marveled at how much data our devices could hold. Just as we upgraded from a small plastic pumpkin to a pillowcase for larger candy collections - we saved a growing plethora of emails, text messages, digital images, voice messages, and all manner of documents on mobile devices. Now, with the rise of discovery, we want our vulnerable data to disappear as if it were our least favorite candy. Ephemeral applications may be just the trick for that unwanted data. Call It What You Will There is no consensus about what constitutes an ephemeral application beyond the understanding that there is an element of impermanence. In 2016, three Georgia Tech College of Computing researchers proposed the creation of “ephemeral apps” that would allow users to engage with apps on a trial basis that would “pop-up instantaneously” on devices and then disappear after a certain period (https://www.cc.gatech.edu/~kbhardwa/papers/eapps.pdf). At the opposite end of the spectrum, in 2017 fan favorite Snapchat modified its app to allow recipients to determine when photographs and video would disappear rather than the burn after reading settings that propelled Snapchat’s rapid rise (https://www.vox.com/2017/5/9/15595040/snapchat-product-update-limitless-q1-earnings).
    [Show full text]
  • Improving Signal's Sealed Sender
    Improving Signal’s Sealed Sender Ian Martiny∗, Gabriel Kaptchuky, Adam Avivz, Dan Rochex, Eric Wustrow∗ ∗University of Colorado Boulder, fian.martiny, [email protected] yBoston University, [email protected] zGeorge Washington University, [email protected] xU.S. Naval Avademy, [email protected] Abstract—The Signal messaging service recently deployed a confidential support [25]. In these cases, merely knowing to sealed sender feature that provides sender anonymity by crypto- whom Alice is communicating combined with other contextual graphically hiding a message’s sender from the service provider. information is often enough to infer conversation content with- We demonstrate, both theoretically and empirically, that this out reading the messages themselves. Former NSA and CIA one-sided anonymity is broken when two parties send multiple director Michael Hayden succinctly illustrated this importance messages back and forth; that is, the promise of sealed sender of metadata when he said the US government “kill[s] people does not compose over a conversation of messages. Our attack is in the family of Statistical Disclosure Attacks (SDAs), and is made based on metadata” [29]. particularly effective by delivery receipts that inform the sender Signal’s recent sealed sender feature aims to conceal this that a message has been successfully delivered, which are enabled metadata by hiding the message sender’s identity. Instead of by default on Signal. We show using theoretical and simulation- based models that Signal could link sealed sender users in as seeing a message from Alice to Bob, Signal instead observes few as 5 messages. Our attack goes beyond tracking users via a message to Bob from an anonymous sender.
    [Show full text]
  • Issue 4 October 1, 2019
    WELCOME! Issue 4 October 1, 2019 Welcome to Fleas on the Dog! We’re a no frills brown bag BYOW(eed) online lit rag. (We like to think we’re underground with our heads sticking out.). We don’t care about pretty pictures or fancy layouts. We’re interested in one thing and one thing only: GOOD WRITING. Our sole mandate is quality which means if your mother likes your writing we probably won’t. With this issue we are introducing 2 new categories. The first is Poetry. We were deluged with it even though we only call for short fiction and nonfiction. Apart from the obscene sonnets we carved into washroom walls, we don’t know a heck of a lot about it. (The Wasteland is an album by U2, right?) So we coerced, no, invited, bardo-bard Hezekiah Scretch to abase himself as our Poetry Editor. The fact that he despises verse of any kind is only important if you’re a nitpicker. And so the dude quintet has become the dude sextet. The other new category is Plays (Drama). Since all six of us agreed that Shakespeare’s Death of a Salesman is our all-time favourite comedy, we knew we were on the right track. Besides, what Streetcar wouldn’t Desire such a category? So if your name’s Sam Shepard or David Mamet (and even if it isn’t) you’re welcome to submit your play, previously performed or perennially rejected. We’re proud to announce two writers are making their publishing debut in Issue 4.
    [Show full text]